no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A Blockchain-based and resource-aware process execution engine
|
Sturm, Christian |
|
|
100 |
C |
p. 19-34 |
article |
2 |
A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services
|
Islam, Naveed |
|
|
100 |
C |
p. 569-578 |
article |
3 |
A cost-sensitive meta-learning classifier: SPFCNN-Miner
|
Zhao, Linchang |
|
|
100 |
C |
p. 1031-1043 |
article |
4 |
A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code
|
Jeong, Junho |
|
|
100 |
C |
p. 1044-1052 |
article |
5 |
A general AI-defined attention network for predicting CDN performance
|
Li, Junnan |
|
|
100 |
C |
p. 759-769 |
article |
6 |
Agent-based simulation of unmanned aerial vehicles in civilian applications: A systematic literature review and research directions
|
Mualla, Yazan |
|
|
100 |
C |
p. 344-364 |
article |
7 |
A lighten CNN-LSTM model for speaker verification on embedded devices
|
Zhao, Zitian |
|
|
100 |
C |
p. 751-758 |
article |
8 |
A lightweight authentication scheme with privacy protection for smart grid communications
|
Zhang, Liping |
|
|
100 |
C |
p. 770-778 |
article |
9 |
An efficient blind filter: Location privacy protection and the access control in FinTech
|
Li, Zhidan |
|
|
100 |
C |
p. 797-810 |
article |
10 |
An enhanced priority-based scheduling heuristic for DAG applications with temporal unpredictability in task execution and data transmission
|
Zhang, Xinbo |
|
|
100 |
C |
p. 428-439 |
article |
11 |
A new approach for mobile robot localization based on an online IoT system
|
Dourado Junior, Carlos M.J.M. |
|
|
100 |
C |
p. 859-881 |
article |
12 |
An intelligent incentive mechanism for coverage of data collection in cognitive internet of things
|
Liu, Yuxin |
|
|
100 |
C |
p. 701-714 |
article |
13 |
A novel approach to steganography based on the properties of Catalan numbers and Dyck words
|
Saračević, Muzafer |
|
|
100 |
C |
p. 186-197 |
article |
14 |
A novel next new point-of-interest recommendation system based on simulated user travel decision-making process
|
Jiao, Xu |
|
|
100 |
C |
p. 982-993 |
article |
15 |
A self-adaptive and fault-tolerant routing algorithm for wireless sensor networks in microgrids
|
Rui, Lanlan |
|
|
100 |
C |
p. 35-45 |
article |
16 |
A simple and generic paradigm for creating complex networks using the strategy of vertex selecting-and-pairing
|
Wang, Shuangyan |
|
|
100 |
C |
p. 994-1004 |
article |
17 |
A unified two-parallel-branch deep neural network for joint gland contour and segmentation learning
|
Wang, Linbo |
|
|
100 |
C |
p. 316-324 |
article |
18 |
CoCoA++: Delay gradient based congestion control for Internet of Things
|
Rathod, Vishal |
|
|
100 |
C |
p. 1053-1072 |
article |
19 |
Collaborative SLA and reputation-based trust management in cloud federations
|
Papadakis-Vlachopapadopoulos, Konstantinos |
|
|
100 |
C |
p. 498-512 |
article |
20 |
Constructing distributed time-critical applications using cognitive enabled services
|
Simpkin, Chris |
|
|
100 |
C |
p. 70-85 |
article |
21 |
Consumer-facing technology fraud: Economics, attack methods and potential solutions
|
Ali, Mohammed Aamir |
|
|
100 |
C |
p. 408-427 |
article |
22 |
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships
|
Sahay, Rishikesh |
|
|
100 |
C |
p. 736-750 |
article |
23 |
Data recovery algorithm under intrusion attack for energy internet
|
Deng, Song |
|
|
100 |
C |
p. 109-121 |
article |
24 |
Deep neural network architectures for social services diagnosis in smart cities
|
Serrano, Emilio |
|
|
100 |
C |
p. 122-131 |
article |
25 |
Degree-biased random walk for large-scale network embedding
|
Zhang, Yunyi |
|
|
100 |
C |
p. 198-209 |
article |
26 |
DUSKG: A fine-grained knowledge graph for effective personalized service recommendation
|
Wang, Haifang |
|
|
100 |
C |
p. 600-617 |
article |
27 |
Dynamic multi-objective optimized replica placement and migration strategies for SaaS applications in edge cloud
|
Li, Chunlin |
|
|
100 |
C |
p. 921-937 |
article |
28 |
Dynamic multi-workflow scheduling: A deadline and cost-aware approach for commercial clouds
|
Arabnejad, Vahid |
|
|
100 |
C |
p. 98-108 |
article |
29 |
Edge-based stochastic network model reveals structural complexity of edges
|
Zhai, Xuemeng |
|
|
100 |
C |
p. 1073-1087 |
article |
30 |
Editorial Board
|
|
|
|
100 |
C |
p. ii |
article |
31 |
Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference
|
Liang, Wei |
|
|
100 |
C |
p. 132-143 |
article |
32 |
Efficient quantum-based security protocols for information sharing and data protection in 5G networks
|
EL-Latif, Ahmed A. Abd |
|
|
100 |
C |
p. 893-906 |
article |
33 |
Elastic and cost-effective data carrier architecture for smart contract in blockchain
|
Liu, Xiaolong |
|
|
100 |
C |
p. 590-599 |
article |
34 |
Energy-Efficient IoT Service Composition for Concurrent Timed Applications
|
Sun, Mengyu |
|
|
100 |
C |
p. 1017-1030 |
article |
35 |
FCA-based knowledge representation and local generalized linear models to address relevance and diversity in diverse social images
|
Benavent, Xaro |
|
|
100 |
C |
p. 250-265 |
article |
36 |
GC-Wise: A Self-adaptive approach for memory-performance efficiency in Java VMs
|
Simão, J. |
|
|
100 |
C |
p. 674-688 |
article |
37 |
Graph-based and scenario-driven microservice analysis, retrieval, and testing
|
Ma, Shang-Pin |
|
|
100 |
C |
p. 724-735 |
article |
38 |
How to make a digital currency on a blockchain stable
|
Saito, Kenji |
|
|
100 |
C |
p. 58-69 |
article |
39 |
Identifying malicious social media contents using multi-view Context-Aware active learning
|
Das Bhattacharjee, Sreyasee |
|
|
100 |
C |
p. 365-379 |
article |
40 |
Improving fog computing performance via F og-2- F og collaboration
|
Al-khafajiy, Mohammed |
|
|
100 |
C |
p. 266-280 |
article |
41 |
InsideNet: A tool for characterizing convolutional neural networks
|
Muñoz-Martínez, Francisco |
|
|
100 |
C |
p. 298-315 |
article |
42 |
Integrating selective undo of feature-based modeling operations for real-time collaborative CAD systems
|
Lv, Xiao |
|
|
100 |
C |
p. 473-497 |
article |
43 |
KEcruiser: A novel control flow protection for kernel extensions
|
Tian, Donghai |
|
|
100 |
C |
p. 1-9 |
article |
44 |
Lifetime-aware real-time task scheduling on fault-tolerant mixed-criticality embedded systems
|
Cao, Kun |
|
|
100 |
C |
p. 165-175 |
article |
45 |
LoC — A new financial loan management system based on smart contracts
|
Wang, Hao |
|
|
100 |
C |
p. 648-655 |
article |
46 |
Machine learning in the Internet of Things: Designed techniques for smart cities
|
Din, Ikram Ud |
|
|
100 |
C |
p. 826-843 |
article |
47 |
Measuring and rating the energy-efficiency of servers
|
von Kistowski, Jóakim |
|
|
100 |
C |
p. 579-589 |
article |
48 |
Mobile crowdsensing: A survey on privacy-preservation, task management, assignment models, and incentives mechanisms
|
Khan, Fazlullah |
|
|
100 |
C |
p. 456-472 |
article |
49 |
Multiobjective feature selection for microarray data via distributed parallel algorithms
|
Cao, Bin |
|
|
100 |
C |
p. 952-981 |
article |
50 |
Mutation operator integrated ant colony optimization based domestic appliance scheduling for lucrative demand side management
|
Silva, Bhagya Nathali |
|
|
100 |
C |
p. 557-568 |
article |
51 |
Neural network architecture based on gradient boosting for IoT traffic prediction
|
Lopez-Martin, Manuel |
|
|
100 |
C |
p. 656-673 |
article |
52 |
On hybrid network coding for visual traffic surveillance
|
Ling, Chih Wei |
|
|
100 |
C |
p. 440-455 |
article |
53 |
Perception layer security in Internet of Things
|
Khattak, Hasan Ali |
|
|
100 |
C |
p. 144-164 |
article |
54 |
Pipeline-integrity: Scaling the use of authenticated data structures up to the cloud
|
Pennino, Diego |
|
|
100 |
C |
p. 618-647 |
article |
55 |
Profiling the scheduling decisions for handling critical paths in deadline-constrained cloud workflows
|
Taal, Arie |
|
|
100 |
C |
p. 237-249 |
article |
56 |
Realizing integrated prioritized service in the Hadoop cloud system
|
Yeh, Tsozen |
|
|
100 |
C |
p. 176-185 |
article |
57 |
Recommending heterogeneous resources for science gateway applications based on custom templates composition
|
Antequera, Ronny Bazan |
|
|
100 |
C |
p. 281-297 |
article |
58 |
Resource allocation and computation offloading with data security for mobile edge computing
|
Elgendy, Ibrahim A. |
|
|
100 |
C |
p. 531-541 |
article |
59 |
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
|
Al-Sa’d, Mohammad F. |
|
|
100 |
C |
p. 86-97 |
article |
60 |
Robust secure communication protocol for smart healthcare system with FPGA implementation
|
Sureshkumar, Venkatasamy |
|
|
100 |
C |
p. 938-951 |
article |
61 |
RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment
|
Sun, ShengYao |
|
|
100 |
C |
p. 844-858 |
article |
62 |
Runtime evaluation of cognitive systems for non-deterministic multiple output classification problems
|
Gopalakrishna, Aravind Kota |
|
|
100 |
C |
p. 1005-1016 |
article |
63 |
Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners
|
Yin, Hui |
|
|
100 |
C |
p. 689-700 |
article |
64 |
Secure virtual machine placement in cloud data centers
|
Agarwal, Amit |
|
|
100 |
C |
p. 210-222 |
article |
65 |
Securing IoTs in distributed blockchain: Analysis, requirements and open issues
|
Moin, Sana |
|
|
100 |
C |
p. 325-343 |
article |
66 |
Smart electronic gastroscope system using a cloud–edge collaborative framework
|
Ding, Shuai |
|
|
100 |
C |
p. 395-407 |
article |
67 |
Social event decomposition for constructing knowledge graph
|
Nguyen, Hoang Long |
|
|
100 |
C |
p. 10-18 |
article |
68 |
Spatio-temporal context-aware collaborative QoS prediction
|
Zhou, Qimin |
|
|
100 |
C |
p. 46-57 |
article |
69 |
Stackelberg model based game theory approach for assortment and selling price planning for small scale online retailers
|
Saberi, Zahra |
|
|
100 |
C |
p. 1088-1102 |
article |
70 |
Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets
|
Migdal, Denis |
|
|
100 |
C |
p. 907-920 |
article |
71 |
Survey of agent-based cloud computing applications
|
De la Prieta, Fernando |
|
|
100 |
C |
p. 223-236 |
article |
72 |
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
|
Ostad-Sharif, Arezou |
|
|
100 |
C |
p. 882-892 |
article |
73 |
Towards extending the SWITCH platform for time-critical, cloud-based CUDA applications: Job scheduling parameters influencing performance
|
Knight, Louise |
|
|
100 |
C |
p. 542-556 |
article |
74 |
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset
|
Koroniotis, Nickolaos |
|
|
100 |
C |
p. 779-796 |
article |
75 |
Unsupervised multi-stage attack detection framework without details on single-stage attacks
|
Shin, Jinmyeong |
|
|
100 |
C |
p. 811-825 |
article |
76 |
Unsupervised multi-view non-negative for law data feature learning with dual graph-regularization in smart Internet of Things
|
Qiu, Xiru |
|
|
100 |
C |
p. 523-530 |
article |
77 |
Virtual machine allocation and migration based on performance-to-power ratio in energy-efficient clouds
|
Ruan, Xiaojun |
|
|
100 |
C |
p. 380-394 |
article |
78 |
Wale: A solution to share libraries in Docker containers
|
D’Urso, Fabio |
|
|
100 |
C |
p. 513-522 |
article |
79 |
Witness-based searchable encryption with optimal overhead for cloud-edge computing
|
Chen, Yu-Chi |
|
|
100 |
C |
p. 715-723 |
article |